Search Results for author: Qichao Ying

Found 18 papers, 2 papers with code

Fact-checking based fake news detection: a review

no code implementations3 Jan 2024 Yuzhou Yang, Yangming Zhou, Qichao Ying, Zhenxing Qian, Dan Zeng, Liang Liu

This paper reviews and summarizes the research results on fact-based fake news from the perspectives of tasks and problems, algorithm strategies, and datasets.

Fact Checking Fake News Detection

From Covert Hiding to Visual Editing: Robust Generative Video Steganography

no code implementations1 Jan 2024 Xueying Mao, Xiaoxiao Hu, Wanli Peng, Zhenliang Gan, Qichao Ying, Zhenxing Qian, Sheng Li, Xinpeng Zhang

Traditional video steganography methods are based on modifying the covert space for embedding, whereas we propose an innovative approach that embeds secret message within semantic feature for steganography during the video editing process.

Face Swapping Image Steganography +1

PROMPT-IML: Image Manipulation Localization with Pre-trained Foundation Models Through Prompt Tuning

no code implementations1 Jan 2024 Xuntao Liu, Yuzhou Yang, Qichao Ying, Zhenxing Qian, Xinpeng Zhang, Sheng Li

We observe that humans tend to discern the authenticity of an image based on both semantic and high-frequency information, inspired by which, the proposed framework leverages rich semantic knowledge from pre-trained visual foundation models to assist IML.

Image Manipulation Image Manipulation Localization

DRAW: Defending Camera-shooted RAW against Image Manipulation

no code implementations ICCV 2023 Xiaoxiao Hu, Qichao Ying, Zhenxing Qian, Sheng Li, Xinpeng Zhang

RAW files are the initial measurement of scene radiance widely used in most cameras, and the ubiquitously-used RGB images are converted from RAW data through Image Signal Processing (ISP) pipelines.

Image Manipulation

RetouchingFFHQ: A Large-scale Dataset for Fine-grained Face Retouching Detection

no code implementations20 Jul 2023 Qichao Ying, Jiaxin Liu, Sheng Li, Haisheng Xu, Zhenxing Qian, Xinpeng Zhang

However, the lack of large-scale and fine-grained face retouching datasets has been a major obstacle to progress in this field.

Representation Learning

StyleStegan: Leak-free Style Transfer Based on Feature Steganography

no code implementations1 Jul 2023 Xiujian Liang, Bingshan Liu, Qichao Ying, Zhenxing Qian, Xinpeng Zhang

Our method consists of two main components: a style transfer method that accomplishes artistic stylization on the original image and an image steganography method that embeds content feature secrets on the stylized image.

Image Steganography SSIM +1

Multi-modal Fake News Detection on Social Media via Multi-grained Information Fusion

no code implementations3 Apr 2023 Yangming Zhou, Yuzhou Yang, Qichao Ying, Zhenxing Qian, Xinpeng Zhang

The easy sharing of multimedia content on social media has caused a rapid dissemination of fake news, which threatens society's stability and security.

Fake News Detection

Learning to Immunize Images for Tamper Localization and Self-Recovery

no code implementations28 Oct 2022 Qichao Ying, Hang Zhou, Zhenxing Qian, Sheng Li, Xinpeng Zhang

Image immunization (Imuge) is a technology of protecting the images by introducing trivial perturbation, so that the protected images are immune to the viruses in that the tampered contents can be auto-recovered.

Image Generation Network for Covert Transmission in Online Social Network

no code implementations21 Jul 2022 Zhengxin You, Qichao Ying, Sheng Li, Zhenxing Qian, Xinpeng Zhang

Online social networks have stimulated communications over the Internet more than ever, making it possible for secret message transmission over such noisy channels.

Image Generation Image Steganography +2

Bootstrapping Multi-view Representations for Fake News Detection

1 code implementation12 Jun 2022 Qichao Ying, Xiaoxiao Hu, Yangming Zhou, Zhenxing Qian, Dan Zeng, Shiming Ge

Representations from each view are separately used to coarsely predict the fidelity of the whole news, and the multimodal representations are able to predict the cross-modal consistency.

Decision Making Fake News Detection

Image Protection for Robust Cropping Localization and Recovery

no code implementations6 Jun 2022 Qichao Ying, Hang Zhou, Xiaoxiao Hu, Zhenxing Qian, Sheng Li, Xinpeng Zhang

Existing image cropping detection schemes ignore that recovering the cropped-out contents can unveil the purpose of the behaved cropping attack.

Image Cropping

A DTCWT-SVD Based Video Watermarking resistant to frame rate conversion

no code implementations2 Jun 2022 Yifei Wang, Qichao Ying, Zhenxing Qian, Sheng Li, Xinpeng Zhang

To address this issue, we present a new video watermarking based on joint Dual-Tree Cosine Wavelet Transformation (DTCWT) and Singular Value Decomposition (SVD), which is resistant to frame rate conversion.

Multimodal Fake News Detection via CLIP-Guided Learning

no code implementations28 May 2022 Yangming Zhou, Qichao Ying, Zhenxing Qian, Sheng Li, Xinpeng Zhang

The results indicate that the proposed framework has a better capability in mining crucial features for fake news detection.

Decision Making Fake News Detection +1

Invertible Image Dataset Protection

no code implementations29 Dec 2021 Kejiang Chen, Xianhan Zeng, Qichao Ying, Sheng Li, Zhenxing Qian, Xinpeng Zhang

We develop a reversible adversarial example generator (RAEG) that introduces slight changes to the images to fool traditional classification models.

Adversarial Defense

From Image to Imuge: Immunized Image Generation

1 code implementation27 Oct 2021 Qichao Ying, Zhenxing Qian, Hang Zhou, Haisheng Xu, Xinpeng Zhang, Siyi Li

At the recipient's side, the verifying network localizes the malicious modifications, and the original content can be approximately recovered by the decoder, despite the presence of the attacks.

Image Cropping Image Generation

Hiding Images into Images with Real-world Robustness

no code implementations12 Oct 2021 Qichao Ying, Hang Zhou, Xianhan Zeng, Haisheng Xu, Zhenxing Qian, Xinpeng Zhang

The existing image embedding networks are basically vulnerable to malicious attacks such as JPEG compression and noise adding, not applicable for real-world copyright protection tasks.

RWN: Robust Watermarking Network for Image Cropping Localization

no code implementations12 Oct 2021 Qichao Ying, Xiaoxiao Hu, Xiangyu Zhang, Zhenxing Qian, Xinpeng Zhang

At the recipient's side, ACP extracts the watermark from the attacked image, and we conduct feature matching on the original and extracted watermark to locate the position of the crop in the original image plane.

Image Cropping Image Forensics

Cannot find the paper you are looking for? You can Submit a new open access paper.